ciphertext


Also found in: Dictionary, Thesaurus, Medical, Legal, Financial, Wikipedia.

ciphertext

[′sī·fər‚tekst]
(communications)
A message which has been transformed by a cipher so that it can be read only by those privy to the secrets of the cipher.
McGraw-Hill Dictionary of Scientific & Technical Terms, 6E, Copyright © 2003 by The McGraw-Hill Companies, Inc.

ciphertext

(cryptography)
Text which has been encrypted by some encryption system.

Opposite: plaintext.
This article is provided by FOLDOC - Free Online Dictionary of Computing (foldoc.org)

ciphertext

Data that has been encrypted for security purposes. See plaintext.
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
DAD: Upon inputting a sender's identity [ID.sub.s], the ciphertext [sigma], and a receiver's private key [mathematical expression not reproducible], the receiver calculates [mathematical expression not reproducible], obtaining either the message m or [perpendicular to] when [sigma] is an invalid ciphertext.
Their FHE scheme is constructed from a somewhat homomorphic scheme, a scheme that can evaluates low degree polynomial on ciphertext. To achieve fully homomorphic properties, they have implemented squashing technique introduced by Gentry.
After the cloud server receives the request f(), it runs Eval and outputs the resulting ciphertext [??] to the requester.
ciphertext; and the password, i.e., the secret information needed to
Input : a ciphertext [CT.sub.F], a file tag value [Tag.sub.F], a secret key [mathematical expression not reproducible] Output : an expected response array [ResArr.sub.Clt] (1) for i in [1, 3] (2) [mathematical expression not reproducible] (3) for j in[1, t] (4) [mathematical expression not reproducible] (5) [mathematical expression not reproducible] (6) [mathematical expression not reproducible] (7) [sigma] [left arrow] [CT.sub.F][[[pi].sub.k](1)] [parallel] ...
The definitions assume that a set of attributes describes a group access structure and the ciphertext embeds the access structure.
With the implementation, examine the computational time for STAMP, time with respect to packet size for blowfish algorithm and encryption and decryption time in Ciphertext Policy Attribute Based Encryption method.
If an attacker wants to make replay attack in the same period, then it should modify [r.sub.0] in ciphertext [mathematical expression not reproducible] that is also impossible.
(2) The encryption algorithm Enc(k,m): on inputting a key k [member of] K and a message m [member of] M, Enc outputs a ciphertext c [member of] C
By (14), the plaintext equations, that is, the initial round equation system, can be obtained as (21), and the ciphertext equations can be obtained as (22).
The DNA sequence is mainly used for ciphertext diffusion as well as the generation of hash values.